Blogs | AlienVault
The AlienVault Blogs: Taking On Today’s Threats

The most recent posts from across the AlienVault blogs.

Subscribe: Via Email | RSS


Late-breaking discoveries and in-depth analysis.

Subscribe: Via Email | RSS


Practical, how-to advice, tips and guidance.

Subscribe: Via Email | RSS

A roundup of the week’s news, commentary, and observations.Black Hat, BsidesLV, and DefCon are upon us! Next week will see the annual gathering of security professionals in Las Vegas. We will be there with our booth (1016) at Black Hat, and I will be presenting a talk, How to Become "The" Security Pro, at BsidesLV. Full details of… Read more


This is Part 16 of a 'How-To' effort to compile a list of tools (free and commercial) that can help IT administrators comply with what was formerly known as the "SANS Top 20 Security Controls". It is now known as the Center for Internet Security (CIS) Security Controls. A summary of the previous posts is here:Part 1 - we looked at Inventory… Read more

Tags: sans, account monitoring

AlienVault is releasing another major new feature called Private Groups in Open Threat Exchange (OTX) today. This new feature allows users within OTX to create a private group of other OTX users and control access to the threat data shared within that group. Threat data contained within the private group stays in the private group and is not shared more… Read more

Tags: otx

Nothing can make your heart drop to your stomach like discovering your network has been breached. It's a horrible situation to find yourself in, but with a little forethought and some simple steps, you can minimize the damage to your company and your career.A key task to complete before you suffer a system compromise is to prepare an… Read more

Tags: security breach, incidence response

A roundup of the week’s news, commentary, and observations.Pokemon Go has been all over the news this week, with initial reports of the app obtaining excessive permission, to reports of people being injured, or mugged by luring unsuspecting users.But this isn’t a new problem, simply a repackaging. Mobile apps are notorious for requesting excessive… Read more


Get Email Updates

Labs Research
Security Essentials
All Blogs

Gartner MQ

Featured Content